Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (16)
- Computer Sciences (13)
- Engineering (11)
- Computer Engineering (9)
- Business (4)
-
- Information Security (4)
- Social and Behavioral Sciences (4)
- Electrical and Computer Engineering (3)
- Library and Information Science (3)
- Databases and Information Systems (2)
- Digital Communications and Networking (2)
- Industrial Technology (2)
- Manufacturing (2)
- Mechanical Engineering (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Systems Engineering (2)
- Technology and Innovation (2)
- Accounting (1)
- Astrophysics and Astronomy (1)
- Bioinformatics (1)
- Business Administration, Management, and Operations (1)
- Computer and Systems Architecture (1)
- Data Science (1)
- Data Storage Systems (1)
- Electrical and Electronics (1)
- Environmental Sciences (1)
- Hardware Systems (1)
- Intellectual Property Law (1)
- Law (1)
- Life Sciences (1)
- Institution
-
- University of Nebraska - Lincoln (5)
- Old Dominion University (3)
- Singapore Management University (3)
- Changsha University of Science and Technology (2)
- Sheridan College (2)
-
- TÜBİTAK (2)
- Walden University (2)
- Zayed University (2)
- Butler University (1)
- Clemson University (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Medical University of South Carolina (1)
- Portland State University (1)
- San Jose State University (1)
- United Arab Emirates University (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of Louisville (1)
- University of the Pacific (1)
- Publication
-
- Library Philosophy and Practice (e-journal) (5)
- Research Collection School Of Computing and Information Systems (3)
- All Works (2)
- Information Technology & Decision Sciences Faculty Publications (2)
- Journal of Electric Power Science and Technology (2)
-
- Student Capstones (2)
- Turkish Journal of Electrical Engineering and Computer Sciences (2)
- Walden Dissertations and Doctoral Studies (2)
- Accounting Undergraduate Honors Theses (1)
- All Dissertations (1)
- Computer Science Faculty Publications (1)
- Computer Science Faculty Publications and Presentations (1)
- Doctoral Dissertations and Master's Theses (1)
- Earth and Environmental Sciences Faculty Publications (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Research, Scholarly, and Creative Activity (1)
- Faculty Scholarship (1)
- MUSC Theses and Dissertations (1)
- Scholarship and Professional Work - Business (1)
- UAEU Law Journal (1)
- University of the Pacific Theses and Dissertations (1)
- Publication Type
Articles 1 - 30 of 33
Full-Text Articles in Entire DC Network
Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic
Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic
Computer Science Faculty Publications and Presentations
Current trends in HPC, such as the push to exascale, convergence with Big Data, and growing complexity of HPC applications, have created gaps that traditional performance tools do not cover. One example is Holistic HPC Workflows — HPC workflows comprising multiple codes, paradigms, or platforms that are not developed using a workflow management system. To diagnose the performance of these applications, we define a new metric called Workflow Critical Path (WCP), a data-oriented metric for Holistic HPC Workflows. WCP constructs graphs that span across the workflow codes and platforms, using data states as vertices and data mutations as edges. …
Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan
Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan
Student Capstones
The purpose of this mobile app is to provide the Sheridan students, the tools and the personal space to design and map their own development process. This process is essential as it is used to set goals and improve efficiency and productivity to make students more agile and resilient and enable them to reevaluate their goals based on the data collected. The ideal solution is to create that virtual space to allow them to self-asses with daily/weekly reflections, then set goals accordingly to find relevant opportunities and resources. By providing this platform, students would generate their own data to monitor …
Studysnap, Liam A. Stickney, Malik Sheharyaar Talhat, Benjamin D. Sykes
Studysnap, Liam A. Stickney, Malik Sheharyaar Talhat, Benjamin D. Sykes
Student Capstones
In today’s modern education world, there have been several emerging technologies that were created to expand the learning experience beyond the traditional pencil and paper. Such items include online planners and numerous online student resource websites, but some students may find that there are sometimes too many resources. With so many resources available to them, students may find it overwhelming and may not even know where to start when it comes time to study. StudySnap aims to solve the unorganized and cluttered nature of study time by combining a clean resource organization tool with a smart and automatic resource search …
Intelligent Resource Prediction For Hpc And Scientific Workflows, Benjamin Shealy
Intelligent Resource Prediction For Hpc And Scientific Workflows, Benjamin Shealy
All Dissertations
Scientific workflows and high-performance computing (HPC) platforms are critically important to modern scientific research. In order to perform scientific experiments at scale, domain scientists must have knowledge and expertise in software and hardware systems that are highly complex and rapidly evolving. While computational expertise will be essential for domain scientists going forward, any tools or practices that reduce this burden for domain scientists will greatly increase the rate of scientific discoveries. One challenge that exists for domain scientists today is knowing the resource usage patterns of an application for the purpose of resource provisioning. A tool that accurately estimates these …
Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud
Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud
Earth and Environmental Sciences Faculty Publications
Knowledge of the groundwater potential, especially in an arid region, can play a major role in planning the sustainable management of groundwater resources. In this study, nine machine learning (ML) algorithms—namely, Artificial Neural Network (ANN), Decision Jungle (DJ), Averaged Perceptron (AP), Bayes Point Machine (BPM), Decision Forest (DF), Locally-Deep Support Vector Machine (LD-SVM), Boosted Decision Tree (BDT), Logistic Regression (LG), and Support Vector Machine (SVM)—were run on the Microsoft Azure cloud computing platform to model the groundwater potential. We investigated the relationship between 512 operating boreholes with a specified specific capacity and 14 groundwater-influencing occurrence factors. The unconfined aquifer in …
A Model Approach To Cloud Implementation On Public Libraries With A Focus On West Bengal, India, Tanmay De Sarkar , Corresponding Author, Jitendra Nath Shaw , Main Author
A Model Approach To Cloud Implementation On Public Libraries With A Focus On West Bengal, India, Tanmay De Sarkar , Corresponding Author, Jitendra Nath Shaw , Main Author
Library Philosophy and Practice (e-journal)
The purpose of this paper is to explore the possibility of introducing cloud architecture for public library system in areas where library automation is operational on a standalone server. It also proposes a cloud based model library management system to function on an affordable, robust architecture. The paper made an attempt to highlight the present status of library automation and networking among public libraries in West Bengal. It presents functional requirements for a SaaS based (Software as a Service) model. The simulation approach for the model architecture supports the possibility to connect all public libraries across different hierarchical tiers under …
Reconsidering Big Data Security And Privacy In Cloud And Mobile Cloud Systems, Lo'ai A. Tawalbeh, Gokay Saldamli
Reconsidering Big Data Security And Privacy In Cloud And Mobile Cloud Systems, Lo'ai A. Tawalbeh, Gokay Saldamli
Faculty Research, Scholarly, and Creative Activity
Large scale distributed systems in particular cloud and mobile cloud deployments provide great services improving people's quality of life and organizational efficiency. In order to match the performance needs, cloud computing engages with the perils of peer-to-peer (P2P) computing and brings up the P2P cloud systems as an extension for federated cloud. Having a decentralized architecture built on independent nodes and resources without any specific central control and monitoring, these cloud deployments are able to handle resource provisioning at a very low cost. Hence, we see a vast amount of mobile applications and services that are ready to scale to …
Application Research Of Static Security Analysis Cloud Computing Based On Docker Technology, Yang Liu, Ruifeng Zhao, Bo Li, Haizhu Wang, Dawei Deng
Application Research Of Static Security Analysis Cloud Computing Based On Docker Technology, Yang Liu, Ruifeng Zhao, Bo Li, Haizhu Wang, Dawei Deng
Journal of Electric Power Science and Technology
To match to the development of the concurrency and expansibility requirements of multiuser static security analysisin power dispatching systems, this paper analyzes the characteristics of static security analysis and calculation, and combines it with docker technology.Based on Docker technology, astatic security analysis cloud computing application method is proposed for designing the operation architecture of the application. In this method, Docker container images are generated corresponding to different power flow algorithms, and the data exchangebetween users and containers are realized by using Protobuf. New containers are dynamically created and idle containers is allocated according to the calculation request. Containerswill be released …
Outsourcing Service Fair Payment Based On Blockchain And Its Applications In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng
Outsourcing Service Fair Payment Based On Blockchain And Its Applications In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng
Research Collection School Of Computing and Information Systems
As a milestone in the development of outsourcing services, cloud computing enables an increasing number of individuals and enterprises to enjoy the most advanced services from outsourcing service providers. Because online payment and data security issues are involved in outsourcing services, the mutual distrust between users and service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing solutions only consider a specific type of services and rely on a trusted third-party to realize fair payment. In this paper, to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or …
Tess As A Low-Surface-Brightness Observatory: Cutouts From Wide-Area Coadded Images, G. Bruce Berriman, John C. Good, Benne Holwerda
Tess As A Low-Surface-Brightness Observatory: Cutouts From Wide-Area Coadded Images, G. Bruce Berriman, John C. Good, Benne Holwerda
Faculty Scholarship
We present a mosaic of those co-added Full Frame Images acquired by the TESS satellite that had been released in 2020 April. The mosaic shows substantial stray light over the sky. Yet over spatial scales of a few degrees, the background appears uniform. This result indicates that TESS has considerable potential as a Low Surface Brightness Observatory. The co-added images are freely available as a High Level Science Product (HLSP) at MAST and accessible through a Jupyter Notebook.
Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A
Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A
Library Philosophy and Practice (e-journal)
The research is the outcome of the investigation of 4035 papers on web services and cloud study, as covered in the Web of Knowledge core collection database during 2010 - 2019, going through an overall group author contribution of 29.00% during the period, Iosup, Alexandru, et al with a citation impact per paper of 44.10% and a journal impact per paper of 5.768 by Future generation computer systems-the international journal of science. The world's web services and cloud research output is diverse, with the top three open access research journals accounting for 66.59% (All Open Access 44.03%, DOAJ Gold 17.41%, …
Energy-Efficient Load Balancing Algorithm For Workflow Scheduling In Cloud Data Centers Using Queuing And Thresholds, Nimra Malik, Muhammad Sardaraz, Muhammad Tahir, Babar Shah, Gohar Ali, Fernando Moreira
Energy-Efficient Load Balancing Algorithm For Workflow Scheduling In Cloud Data Centers Using Queuing And Thresholds, Nimra Malik, Muhammad Sardaraz, Muhammad Tahir, Babar Shah, Gohar Ali, Fernando Moreira
All Works
Cloud computing is a rapidly growing technology that has been implemented in various fields in recent years, such as business, research, industry, and computing. Cloud computing provides different services over the internet, thus eliminating the need for personalized hardware and other resources. Cloud computing environments face some challenges in terms of resource utilization, energy efficiency, heterogeneous resources, etc. Tasks scheduling and virtual machines (VMs) are used as consolidation techniques in order to tackle these issues. Tasks scheduling has been extensively studied in the literature. The problem has been studied with different parameters and objectives. In this article, we address the …
Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob
Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob
Research Collection School Of Computing and Information Systems
Internet of Things (IoT) is an integration of various technologies to provide technological enhancements. To enforce access control on low power operated battery constrained devices is a challenging issue in IoT scenarios. Attribute-based encryption (ABE) has emerged as an access control mechanism to allow users to encrypt and decrypt data based on an attributes policy. However, to accommodate the expressiveness of policy for practical application scenarios, attributes may be repeated in a policy. For certain policies, the attributes repetition cannot be avoided even after applying the boolean optimization techniques to attain an equivalent smaller length boolean formula. For such policies, …
Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.
Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.
Library Philosophy and Practice (e-journal)
Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …
How The Growth Of Technology Has Forced Accounting Firms To Put An Emphasis On Cybersecurity, Holden Halbach
How The Growth Of Technology Has Forced Accounting Firms To Put An Emphasis On Cybersecurity, Holden Halbach
Accounting Undergraduate Honors Theses
The advancement of technology has brought many changes to accounting firms. Computer applications such as Microsoft Excel have made calculators and physical spreadsheets obsolete. Then with the introduction of cloud computing employees can store, access, and exchange large amounts of data instantaneously from any location. These technological innovations have increased the accuracy and efficiency of firms substantially. However, this growth in technology has shown the importance of putting an emphasis on cybersecurity throughout the accounting industry. The emphasis placed on cybersecurity throughout accounting firms is more prevalent than any other industry. This is primarily because accounting firms not only deal …
Parallel Clustering Analysis For Power Consumption Data Based On Graph Model, Peng Tao, Yangrui Zhang, Mengyu Li, Jielin Li
Parallel Clustering Analysis For Power Consumption Data Based On Graph Model, Peng Tao, Yangrui Zhang, Mengyu Li, Jielin Li
Journal of Electric Power Science and Technology
As the deepen development of smart grids construction, more and more monitoring data are collected in power distribution network, and gradually forming big data on the user side of smart grids. The traditional data analysis model does no longer meet performance requirements of huge data processing. Thereby new storage and data analysis models are urgently needed to be established. Under this background, this paper proposes a cluster analysis method for massive electricity consumption data based on the Alibaba Cloud big data analysis platform MaxCompute. The characteristics of power consumption data are fully considered, and a multilevel partition tablebased power consumption …
Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami
Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami
Doctoral Dissertations and Master's Theses
Many research projects are too complex to yield the efforts of a single investigator and require a coordinated effort from interdisciplinary research teams across universities and industries. The research data, documents, experimental testbeds, high-end computing equipment, etc. is a critical component of any large-scale project and hence the cooperation and resource sharing across universities become very important for timely and budget-friendly execution of these projects. However, it is extremely challenging to frequently and effectively access data and other resources across universities without creating new identities for the users. In this thesis, we propose Federated Identity Management (FIM) approach for facilitating …
Enabling Distributed Applications Optimization In Cloud Environment, Pinchao Liu
Enabling Distributed Applications Optimization In Cloud Environment, Pinchao Liu
FIU Electronic Theses and Dissertations
The past few years have seen dramatic growth in the popularity of public clouds, such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Container-as-a-Service (CaaS). In both commercial and scientific fields, quick environment setup and application deployment become a mandatory requirement. As a result, more and more organizations choose cloud environments instead of setting up the environment by themselves from scratch. The cloud computing resources such as server engines, orchestration, and the underlying server resources are served to the users as a service from a cloud provider. Most of the applications that run in public clouds are the distributed applications, also called …
A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.
A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.
Library Philosophy and Practice (e-journal)
Access Control is mentioned to as the imprisonment of particular activities of an individual to carry out an action. Cloud storing similar to any other untrusted surroundings wants the capacity to protect the shared data. The one of the apparatus of access mechanism is ciphertext-policy attribute-based encryption system over and done with dynamic characteristics. With a blockchain based distributed ledger, the scheme offers immutable log of whole significant safety events, for example key generation, change or revocation, access policy assignment, access request etc. Number of different problems similar to single point of failure, security and privacy etc. were targeted through …
Quantitative Analysis And Performance Evaluation Of Target-Oriented Replication Strategies In Cloud Computing, Quadri Waseem, Wan Isni Sofiah Wan Din, Sultan S. Alshamrani, Abdullah Alharbi, Amril Nazir
Quantitative Analysis And Performance Evaluation Of Target-Oriented Replication Strategies In Cloud Computing, Quadri Waseem, Wan Isni Sofiah Wan Din, Sultan S. Alshamrani, Abdullah Alharbi, Amril Nazir
All Works
Data replications effectively replicate the same data to various multiple locations to accomplish the objective of zero loss of information in case of failures without any downtown. Dynamic data replication strategies (providing run time location of replicas) in clouds should optimize the key performance indicator parameters, like response time, reliability, availability, scalability, cost, availability, performance, etc. To fulfill these objectives, various state-of-the-art dynamic data replication strategies has been proposed, based on several criteria and reported in the literature along with advantages and disadvantages. This paper provides a quantitative analysis and performance evaluation of target-oriented replication strategies based on target objectives. …
Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghu Zheng
Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghu Zheng
Research Collection School Of Computing and Information Systems
Encrypted data deduplication, along with different preferences in data access control, brings the birth of hybrid encrypted cloud data deduplication (H-DEDU for short). However, whether H-DEDU can be successfully deployed in practice has not been seriously investigated. Obviously, the adoption of H-DEDU depends on whether it can bring economic benefits to all stakeholders. But existing economic models of cloud storage fail to support H-DEDU due to complicated interactions among stakeholders. In this article, we establish a formal economic model of H-DEDU by formulating the utilities of all involved stakeholders, i.e., data holders, data owners, and Cloud Storage Providers (CSPs). Then, …
The Extent Of Application Of The General Rules For The Protection Of Intellectual Works Stored Through Cloud Computing: A Study In Uae Legislation, Alaa Khasawneh
UAEU Law Journal
This research focuses on the most important legal problems raised by cloud computing services and its applications, especially the protection of content stored through these applications. Some legislations have organized these risks with special laws relating to personal data. The study concluded that the Emirati legislator should trait the legal aspects of cloud computing and create its own legal framework.
Keywords: Cloud computing, intellectual property, terms of service.
Awareness And Adoption Of Cloud Computing In Nigerian Libraries: An Aid To Library Services, Aishatu Nya Zubairu Miss, John Olugbenga Akiola Mr, Saheed Abiola Hamzat Ph.D
Awareness And Adoption Of Cloud Computing In Nigerian Libraries: An Aid To Library Services, Aishatu Nya Zubairu Miss, John Olugbenga Akiola Mr, Saheed Abiola Hamzat Ph.D
Library Philosophy and Practice (e-journal)
Abstract
The study focused on awareness and adoption of cloud computing in Nigerian libraries. Given the importance of cloud computing to information resources storage and service delivery, it has become necessary to find out the extent of awareness among library personnel and to ascertain what they use it for, either for personnel or professional use and as well the area to which cloud based services has been adopted in some selected Private Universities in Osun State. A survey design was adopted for this study. Fifty-three library personnel from four private university libraries constitutes the respondent for the study. These respondents …
Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran
Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran
Scholarship and Professional Work - Business
There are many advantages to adopt cloud computing, however, some important issues need to be addressed, such as cybersecurity, cost-saving, trust, implementation complexity, and cloud provider’s reliability. This study developed a research framework to study the human factors that interact with technical and cybersecurity factors to affect the cloud-computing provider’s performance from the user’s perspective. Research hypotheses were developed and a survey was conducted to test the hypotheses and validate the research framework.
A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu
A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu
Computer Science Faculty Publications
In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this survey is to …
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Walden Dissertations and Doctoral Studies
Despite the many benefits offered by cloud computing’s design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authors’ validated survey …
The Relationship Between Technology Adoption Determinants And The Intention To Use Software-Defined Networking, Wendell Russ
The Relationship Between Technology Adoption Determinants And The Intention To Use Software-Defined Networking, Wendell Russ
Walden Dissertations and Doctoral Studies
AbstractThe advent of distributed cloud computing and the exponential growth and demands of the internet of things and big data have strained traditional network technologies' capabilities and have given rise to software-defined networking's (SDN's) revolutionary approach. Some information technology (IT) cloud services leaders who do not intend to adopt SDN technology may be unable to meet increasing performance and flexibility demands and may risk financial loss compared to those who adopt SDN technology. Grounded in the unified theory of acceptance and use of technology (UTAUT), the purpose of this quantitative correlational study was to examine the relationship between IT cloud …
A Tiered Recommender System For Cost-Effective Cloud Instance Selection, Xusheng Ai
A Tiered Recommender System For Cost-Effective Cloud Instance Selection, Xusheng Ai
University of the Pacific Theses and Dissertations
Cloud computing has greatly impacted the scientific community and the end users. By leveraging cloud computing, small research institutions and undergraduate colleges are able to alleviate costs and achieve research goals without purchasing and maintaining all the hardware and software. In addition, cloud computing allows researchers to access resources as their teams require and allows real-time collaboration with team members across the globe. Nowadays however, users are easily overwhelmed by the wide range of cloud servers and instances. Due to differences between the cloud server platforms and between instances within the platform, users find it difficult to identify the right …
A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan
A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan
Turkish Journal of Electrical Engineering and Computer Sciences
High impact scientific applications processed in distributed data centers often involve big data. To avoid the intolerable delays due to huge data movements across data centers during processing, the concept of moving tasks to data was introduced in the last decade. Even after the realization of this concept termed as data locality, the expected quality of service was not achieved. Later, data colocality was introduced where data groupings were identified and then data chunks were placed wisely. However, the aspect of the expected data traffic during run time is generally not considered while placing data. To identify the expected data …
Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga
Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga
Turkish Journal of Electrical Engineering and Computer Sciences
One of the major security challenges in cloud computing is distributed denial of service (DDoS) attacks. In these attacks, multiple nodes are used to attack the cloud by sending huge traffic. This results in the unavailability of cloud services to legitimate users. In this research paper, a hybrid machine learning-based technique has been proposed to detect these attacks. The proposed technique is implemented by combining the extreme learning machine (ELM) model and the blackhole optimization algorithm. Various experiments have been performed with the help of four benchmark datasets namely, NSL KDD, ISCX IDS 2012, CICIDS2017, and CICDDoS2019, to evaluate the …